Most VitalSource eBooks are available in a reflowable EPUB format which allows you to resize text to suit you and enables other accessibility features. Where the content of the eBook requires a specific layout, or contains maths or other special characters, the eBook will be available in PDF (PBK) format, which cannot be reflowed. For both formats the functionality available will depend on how you access the ebook (via Bookshelf Online in your browser or via the Bookshelf app on your PC or mobile device).

Book Description

Investigators within the law enforcement and cyber forensics communities are generally aware of the concept of steganography, but their levels of expertise vary dramatically depending upon the incidents and cases that they have been exposed to. Now there is a book that balances the playing field in terms of awareness, and serves as a valuable reference source for the tools and techniques of steganography.

The Investigator's Guide to Steganography provides a comprehensive look at this unique form of hidden communication from its earliest beginnings to its most modern uses. The book begins by exploring the past, providing valuable insight into how this method of communication began and evolved from ancient times to the present day. It continues with an in-depth look at the workings of digital steganography and watermarking methods, available tools on the Internet, and a review of companies who are providing cutting edge steganography and watermarking services. The third section builds on the first two by outlining and discussing real world uses of steganography from the business and entertainment to national security and terrorism. The book concludes by reviewing steganography detection methods and what can be expected in the future.

It is an informative and entertaining resource that effectively communicates a general understanding of this complex field.

STEGANOGRAPHY IN DEPTHSteganography TechniquesThe Six Categories of SteganographyTypes of SteganographyEmbedding MethodsSteganography Applied to Different MediaAttacks

WATERMARKINGHistoryClassification of WatermarksTypes of WatermarksReasons for Invisible WatermarkingSpecific Watermarking TechnologiesRequirements of a Robust Digital WatermarkSuitable Methods for WatermarkingWatermarks and CompressionAttacksFingerprintingSummary